US4316055A
(en)
|
1976-12-30 |
1982-02-16 |
International Business Machines Corporation |
Stream/block cipher crytographic system
|
US5889953A
(en)
|
1995-05-25 |
1999-03-30 |
Cabletron Systems, Inc. |
Policy management and conflict resolution in computer networks
|
DE19631068B4
(de)
|
1996-08-01 |
2006-06-01 |
Zimmer Ag |
Verfahren zur Beschleunigung der Polykondensation von Polyester
|
US6499108B1
(en)
|
1996-11-19 |
2002-12-24 |
R. Brent Johnson |
Secure electronic mail system
|
US7912856B2
(en)
|
1998-06-29 |
2011-03-22 |
Sonicwall, Inc. |
Adaptive encryption
|
US7821926B2
(en)
|
1997-03-10 |
2010-10-26 |
Sonicwall, Inc. |
Generalized policy server
|
US8914410B2
(en)
|
1999-02-16 |
2014-12-16 |
Sonicwall, Inc. |
Query interface to policy server
|
US7673323B1
(en)
|
1998-10-28 |
2010-03-02 |
Bea Systems, Inc. |
System and method for maintaining security in a distributed computer network
|
US6330562B1
(en)
|
1999-01-29 |
2001-12-11 |
International Business Machines Corporation |
System and method for managing security objects
|
US6539495B1
(en)
|
1999-02-22 |
2003-03-25 |
International Business Machines Corporation |
Method, system and program products for providing user-managed duplexing of coupling facility cache structures
|
US6721888B1
(en)
|
1999-11-22 |
2004-04-13 |
Sun Microsystems, Inc. |
Mechanism for merging multiple policies
|
AU2001229504A1
(en)
|
2000-01-17 |
2001-07-31 |
Certicom Corp. |
Customizable public key infrastructure and developement tool for same
|
US7065643B1
(en)
|
2000-03-28 |
2006-06-20 |
Motorola, Inc. |
Network compromise recovery methods and apparatus
|
US7660902B2
(en)
|
2000-11-20 |
2010-02-09 |
Rsa Security, Inc. |
Dynamic file access control and management
|
CA2326851A1
(en)
|
2000-11-24 |
2002-05-24 |
Redback Networks Systems Canada Inc. |
Policy change characterization method and apparatus
|
US20020091819A1
(en)
|
2001-01-05 |
2002-07-11 |
Daniel Melchione |
System and method for configuring computer applications and devices using inheritance
|
US6957261B2
(en)
|
2001-07-17 |
2005-10-18 |
Intel Corporation |
Resource policy management using a centralized policy data structure
|
US7280990B2
(en)
|
2001-08-07 |
2007-10-09 |
Ugs Corp. |
Method and system for designing and modeling a product in a knowledge based engineering environment
|
US7159125B2
(en)
|
2001-08-14 |
2007-01-02 |
Endforce, Inc. |
Policy engine for modular generation of policy for a flat, per-device database
|
US7050589B2
(en)
|
2001-08-17 |
2006-05-23 |
Sun Microsystems, Inc. |
Client controlled data recovery management
|
US7499986B2
(en)
|
2001-10-04 |
2009-03-03 |
International Business Machines Corporation |
Storage area network methods with event notification conflict resolution
|
US6678799B2
(en)
|
2001-10-18 |
2004-01-13 |
Hewlett-Packard Development Company, Lp. |
Aggregation of cache-updates in a multi-processor, shared-memory system
|
US7333616B1
(en)
|
2001-11-14 |
2008-02-19 |
Omniva Corp. |
Approach for managing access to messages using encryption key management policies
|
US20030126464A1
(en)
|
2001-12-04 |
2003-07-03 |
Mcdaniel Patrick D. |
Method and system for determining and enforcing security policy in a communication session
|
US7478418B2
(en)
|
2001-12-12 |
2009-01-13 |
Guardian Data Storage, Llc |
Guaranteed delivery of changes to security policies in a distributed system
|
US7380120B1
(en)
|
2001-12-12 |
2008-05-27 |
Guardian Data Storage, Llc |
Secured data format for access control
|
US20040039594A1
(en)
|
2002-01-09 |
2004-02-26 |
Innerpresence Networks, Inc. |
Systems and methods for dynamically generating licenses in a rights management system
|
US20030140257A1
(en)
|
2002-01-22 |
2003-07-24 |
Petr Peterka |
Encryption, authentication, and key management for multimedia content pre-encryption
|
US8176334B2
(en)
|
2002-09-30 |
2012-05-08 |
Guardian Data Storage, Llc |
Document security system that permits external users to gain access to secured files
|
ES2373647T3
(es)
|
2002-02-27 |
2012-02-07 |
Opentv, Inc. |
Método y dispositivo para la obtención de un objeto de perfil de seguridad jerárquica.
|
US7451065B2
(en)
|
2002-03-11 |
2008-11-11 |
International Business Machines Corporation |
Method for constructing segmentation-based predictive models
|
US7474657B2
(en)
|
2002-04-30 |
2009-01-06 |
University Of Florida Research Foundation, Inc. |
Partitioning methods for dynamic router tables
|
US20030225778A1
(en)
|
2002-05-28 |
2003-12-04 |
Craig Fisher |
System and methods for generating a customer specific catalog from a base catalog
|
KR100431210B1
(ko)
|
2002-08-08 |
2004-05-12 |
한국전자통신연구원 |
공개키 기반구조에서 인증서 정책 및 인증서 정책사상을이용한 인증서 검증서버에서의 인증서 검증방법
|
US7184550B2
(en)
|
2002-08-15 |
2007-02-27 |
Intel Corporation |
Method and apparatus for simultaneous decryption and re-encryption of publicly distributed content via stream ciphers
|
US7231664B2
(en)
|
2002-09-04 |
2007-06-12 |
Secure Computing Corporation |
System and method for transmitting and receiving secure data in a virtual private group
|
US7665125B2
(en)
|
2002-09-23 |
2010-02-16 |
Heard Robert W |
System and method for distribution of security policies for mobile devices
|
US7665118B2
(en)
|
2002-09-23 |
2010-02-16 |
Credant Technologies, Inc. |
Server, computer memory, and method to support security policy maintenance and distribution
|
US7437752B2
(en)
|
2002-09-23 |
2008-10-14 |
Credant Technologies, Inc. |
Client architecture for portable device with security policies
|
US7391724B2
(en)
*
|
2002-10-09 |
2008-06-24 |
Spyder Navigations, L.L.C. |
System and method with policy control function for multimedia broadcast/multicast system services
|
GB2394803A
(en)
|
2002-10-31 |
2004-05-05 |
Hewlett Packard Co |
Management of security key distribution using an ancestral hierarchy
|
GB2394805A
(en)
*
|
2002-10-31 |
2004-05-05 |
Hewlett Packard Co |
Determining when to revoke a key in an ancestral hierarchy key distribution system
|
US7412059B1
(en)
|
2002-11-27 |
2008-08-12 |
Voltage Security, Inc. |
Public-key encryption system
|
US8332464B2
(en)
|
2002-12-13 |
2012-12-11 |
Anxebusiness Corp. |
System and method for remote network access
|
GB2398712B
(en)
|
2003-01-31 |
2006-06-28 |
Hewlett Packard Development Co |
Privacy management of personal data
|
US7003117B2
(en)
|
2003-02-05 |
2006-02-21 |
Voltage Security, Inc. |
Identity-based encryption system for secure data distribution
|
US8352725B1
(en)
|
2003-04-21 |
2013-01-08 |
Cisco Technology, Inc. |
Method and apparatus for managing secure communications
|
DE602004001273T2
(de)
|
2003-04-23 |
2007-05-31 |
Hewlett-Packard Development Co., L.P., Houston |
Verfahren und Vorrichtung zur Identifiezierungsbasierten Verschlüsselung
|
WO2004109443A2
(en)
|
2003-06-02 |
2004-12-16 |
Liquid Machines, Inc. |
Managing data objects in dynamic, distributed and collaborative contexts
|
US7289632B2
(en)
|
2003-06-03 |
2007-10-30 |
Broadcom Corporation |
System and method for distributed security
|
EA015549B1
(ru)
*
|
2003-06-05 |
2011-08-30 |
Интертраст Текнолоджис Корпорейшн |
Переносимая система и способ для приложений одноранговой компоновки услуг
|
US7831693B2
(en)
|
2003-08-18 |
2010-11-09 |
Oracle America, Inc. |
Structured methodology and design patterns for web services
|
US7200226B2
(en)
|
2003-09-04 |
2007-04-03 |
Intel Corporation |
Cipher block chaining decryption
|
US20050071439A1
(en)
|
2003-09-29 |
2005-03-31 |
Peter Bookman |
Mobility device platform
|
JP2007507768A
(ja)
|
2003-09-29 |
2007-03-29 |
レルム システムズ インコーポレイテッド |
可動性装置
|
US20050086477A1
(en)
|
2003-10-16 |
2005-04-21 |
Taiwan Semiconductor Manufacturing Co. |
Integrate PGP and Lotus Notes to encrypt / decrypt email
|
US7653816B2
(en)
|
2003-12-30 |
2010-01-26 |
First Information Systems, Llc |
E-mail certification service
|
US9094699B2
(en)
|
2004-02-05 |
2015-07-28 |
Broadcom Corporation |
System and method for security key transmission with strong pairing to destination client
|
US7627617B2
(en)
|
2004-02-11 |
2009-12-01 |
Storage Technology Corporation |
Clustered hierarchical file services
|
US7664828B2
(en)
|
2004-02-20 |
2010-02-16 |
Microsoft Corporation |
Invalid policy detection
|
EP1738239A1
(en)
|
2004-04-12 |
2007-01-03 |
Intercomputer Corporation |
Secure messaging system
|
US7480302B2
(en)
|
2004-05-11 |
2009-01-20 |
Samsung Electronics Co., Ltd. |
Packet classification method through hierarchical rulebase partitioning
|
JP4664358B2
(ja)
|
2004-05-12 |
2011-04-06 |
テレフオンアクチーボラゲット エル エム エリクソン(パブル) |
安全なブロードキャストのための鍵管理メッセージ
|
US7730482B2
(en)
|
2004-06-08 |
2010-06-01 |
Covia Labs, Inc. |
Method and system for customized programmatic dynamic creation of interoperability content
|
US7478426B2
(en)
|
2004-07-20 |
2009-01-13 |
International Busines Machines Corporation |
Multi-field classification dynamic rule updates
|
US7340570B2
(en)
|
2004-08-18 |
2008-03-04 |
Intel Corporation |
Engine for comparing a key with rules having high and low values defining a range
|
US7480385B2
(en)
|
2004-11-05 |
2009-01-20 |
Cable Television Laboratories, Inc. |
Hierarchical encryption key system for securing digital media
|
WO2006064765A1
(ja)
|
2004-12-13 |
2006-06-22 |
Matsushita Electric Industrial Co., Ltd. |
不正機器検出装置及び不正機器検出システム
|
US20070168292A1
(en)
|
2004-12-21 |
2007-07-19 |
Fabrice Jogand-Coulomb |
Memory system with versatile content control
|
US7607164B2
(en)
|
2004-12-23 |
2009-10-20 |
Microsoft Corporation |
Systems and processes for managing policy change in a distributed enterprise
|
US8099598B1
(en)
|
2005-01-03 |
2012-01-17 |
Gary Gang Liu |
Secure messaging system with automatic recipient enrollment
|
KR100675380B1
(ko)
|
2005-01-14 |
2007-01-29 |
삼성전자주식회사 |
저자원 디바이스와 공개키를 사용하는 일반 디바이스 간의인증 방법 및 시스템
|
US8074069B2
(en)
|
2005-02-24 |
2011-12-06 |
International Business Machines Corporation |
Reading a locked windows NFTS EFS encrypted computer file
|
US20110167470A1
(en)
|
2005-02-28 |
2011-07-07 |
Trust Digital, Llc |
Mobile data security system and methods
|
US7478419B2
(en)
|
2005-03-09 |
2009-01-13 |
Sun Microsystems, Inc. |
Automated policy constraint matching for computing resources
|
JP2008541248A
(ja)
|
2005-05-13 |
2008-11-20 |
クリプトミル テクノロジーズ リミティド |
コンテンツ暗号化ファイアウォールシステム
|
US8713667B2
(en)
|
2005-07-08 |
2014-04-29 |
Hewlett-Packard Development Company, L.P. |
Policy based cryptographic application programming interface in secure memory
|
WO2007017882A1
(en)
|
2005-08-05 |
2007-02-15 |
Hewlett-Packard Development Company L.P. |
System, method and apparatus for cryptography key management for mobile devices
|
US7827596B2
(en)
|
2005-08-25 |
2010-11-02 |
International Business Machines Corporation |
Authenticating computed results in a public distributed computing environment
|
JP4975035B2
(ja)
|
2005-09-16 |
2012-07-11 |
コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ |
暗号化による役割ベースのアクセス制御
|
US20070071243A1
(en)
|
2005-09-23 |
2007-03-29 |
Microsoft Corporation |
Key validation service
|
US20090271627A1
(en)
|
2005-09-26 |
2009-10-29 |
Ram Cohen |
Secure Data Transmission
|
US7925756B1
(en)
|
2005-09-30 |
2011-04-12 |
Packeteer, Inc. |
Partition configuration and creation mechanisms for network traffic management devices
|
US8135958B2
(en)
|
2005-11-22 |
2012-03-13 |
International Business Machines Corporation |
Method, system, and apparatus for dynamically validating a data encryption operation
|
US20100217979A1
(en)
|
2005-12-19 |
2010-08-26 |
Karim Yaghmour |
System and Method for Providing Certified Proof of Delivery Receipts for Electronic Mail
|
US9407662B2
(en)
|
2005-12-29 |
2016-08-02 |
Nextlabs, Inc. |
Analyzing activity data of an information management system
|
US20070174362A1
(en)
|
2006-01-18 |
2007-07-26 |
Duc Pham |
System and methods for secure digital data archiving and access auditing
|
US8413209B2
(en)
|
2006-03-27 |
2013-04-02 |
Telecom Italia S.P.A. |
System for enforcing security policies on mobile communications devices
|
US9002018B2
(en)
|
2006-05-09 |
2015-04-07 |
Sync Up Technologies Corporation |
Encryption key exchange system and method
|
US7822209B2
(en)
|
2006-06-06 |
2010-10-26 |
Red Hat, Inc. |
Methods and systems for key recovery for a token
|
JP2008022526A
(ja)
|
2006-06-13 |
2008-01-31 |
Hitachi Ltd |
属性証明書検証方法、属性認証局装置、サービス提供装置、および属性証明書検証システム
|
US7774837B2
(en)
|
2006-06-14 |
2010-08-10 |
Cipheroptics, Inc. |
Securing network traffic by distributing policies in a hierarchy over secure tunnels
|
US7792301B2
(en)
|
2006-06-29 |
2010-09-07 |
Microsoft Corporation |
Access control and encryption in multi-user systems
|
TWI307741B
(en)
|
2006-07-17 |
2009-03-21 |
Delta Electronics Inc |
Fan and selecting method for motor size thereof
|
JP2008027007A
(ja)
|
2006-07-18 |
2008-02-07 |
Canon Inc |
コンテンツ管理システム及びその制御方法
|
US8131719B2
(en)
|
2006-08-16 |
2012-03-06 |
International Business Machines Corporation |
Systems and methods for utilizing organization-specific classification codes
|
JP4634349B2
(ja)
|
2006-08-22 |
2011-02-16 |
株式会社日立製作所 |
IPSec処理装置、ネットワークシステム、及びIPSec処理プログラム
|
FR2905217B1
(fr)
|
2006-08-23 |
2008-12-19 |
Thales Sa |
Systeme et procede de gestion decentralisee d'un systeme securise delivrant differents services
|
US7908474B2
(en)
|
2006-09-22 |
2011-03-15 |
International Business Machines Corporation |
Method for improved key management for ATMs and other remote devices
|
US7779258B2
(en)
|
2006-09-22 |
2010-08-17 |
International Business Machines Corporation |
Method for controlling security function execution with a flexible, extendable, and non-forgable block
|
US8116455B1
(en)
*
|
2006-09-29 |
2012-02-14 |
Netapp, Inc. |
System and method for securely initializing and booting a security appliance
|
US8010784B2
(en)
|
2006-10-10 |
2011-08-30 |
Adobe Systems Incorporated |
Method and apparatus for achieving conformant public key infrastructures
|
US8538028B2
(en)
|
2006-11-20 |
2013-09-17 |
Toposis Corporation |
System and method for secure electronic communication services
|
US20080118070A1
(en)
|
2006-11-20 |
2008-05-22 |
6580874 Canada Inc. |
Open and distributed systems to provide secure email service
|
CA2705903A1
(en)
|
2006-11-20 |
2008-05-29 |
Toposis Corporation |
System and method for secure electronic communication services
|
US8116456B2
(en)
|
2006-11-28 |
2012-02-14 |
Oracle International Corporation |
Techniques for managing heterogeneous key stores
|
US8112622B2
(en)
|
2006-12-08 |
2012-02-07 |
Broadcom Corporation |
Chaining port scheme for network security
|
US20080216153A1
(en)
|
2007-03-02 |
2008-09-04 |
Aaltonen Janne L |
Systems and methods for facilitating authentication of network devices
|
EP1978468A1
(en)
|
2007-04-04 |
2008-10-08 |
Sap Ag |
A method and a system for secure execution of workflow tasks in a distributed workflow management system within a decentralized network system
|
WO2008128212A1
(en)
|
2007-04-12 |
2008-10-23 |
Ncipher Corporation Ltd. |
Method and system for identifying and managing encryption keys
|
US20080271022A1
(en)
|
2007-04-27 |
2008-10-30 |
Motorola, Inc. |
Utilizing graphs to detect and resolve policy conflicts in a managed entity
|
US8584227B2
(en)
|
2007-05-09 |
2013-11-12 |
Microsoft Corporation |
Firewall with policy hints
|
US8296559B2
(en)
|
2007-05-31 |
2012-10-23 |
Red Hat, Inc. |
Peer-to-peer SMIME mechanism
|
US8429400B2
(en)
|
2007-06-21 |
2013-04-23 |
Cisco Technology, Inc. |
VPN processing via service insertion architecture
|
KR20090002392A
(ko)
|
2007-06-28 |
2009-01-09 |
주식회사 케이티프리텔 |
외장 메모리를 이용한 컨텐츠 공유 방법 및 시스템
|
US20090080658A1
(en)
|
2007-07-13 |
2009-03-26 |
Brent Waters |
Method and apparatus for encrypting data for fine-grained access control
|
US8332636B2
(en)
|
2007-10-02 |
2012-12-11 |
International Business Machines Corporation |
Secure policy differentiation by secure kernel design
|
FR2922392B1
(fr)
|
2007-10-12 |
2011-03-04 |
Thales Sa |
Dispositif et procede pour aiguiller des flux d'echange de valeurs publiques (ou non sensibles) permettant de creer des cles secretes communes entre plusieurs zones.
|
US8594321B2
(en)
|
2007-10-26 |
2013-11-26 |
International Business Machines Corporation |
Apparatus and method for operating a symmetric cipher engine in cipher-block chaining mode
|
US20090144380A1
(en)
|
2007-11-21 |
2009-06-04 |
Kallman William R |
Peer-to-peer email
|
KR100930018B1
(ko)
|
2007-12-07 |
2009-12-07 |
주식회사 마크애니 |
디지털 정보 보안 시스템, 커널 드라이버 장치 및 디지털정보 보안 방법
|
EP2232759B1
(en)
|
2007-12-13 |
2018-08-15 |
Symantec Corporation |
Apparatus and method for facilitating cryptographic key management services
|
US7840546B2
(en)
|
2008-01-07 |
2010-11-23 |
Knowledge Computing Corporation |
Method and apparatus for conducting data queries using consolidation strings and inter-node consolidation
|
US8347347B2
(en)
|
2008-01-09 |
2013-01-01 |
International Business Machines Corporation |
Password policy enforcement in a distributed directory when policy information is distributed
|
CN101953112A
(zh)
|
2008-02-25 |
2011-01-19 |
松下电器产业株式会社 |
信息安全装置及信息安全系统
|
US8972447B2
(en)
|
2008-03-18 |
2015-03-03 |
International Business Machines Corporation |
Persistent object linkage using ghosting
|
FR2930663A1
(fr)
|
2008-04-25 |
2009-10-30 |
Thales Sa |
Procede pour gerer des equipements cryptographiques avec une administration unifiee
|
WO2009132446A1
(en)
|
2008-05-02 |
2009-11-05 |
Toposis Corporation |
Systems and methods for secure management of presence information for communications services
|
US9253154B2
(en)
|
2008-08-12 |
2016-02-02 |
Mcafee, Inc. |
Configuration management for a capture/registration system
|
US9712331B1
(en)
|
2008-08-20 |
2017-07-18 |
At&T Mobility Ii Llc |
Systems and methods for performing conflict resolution and rule determination in a policy realization framework
|
US8781127B2
(en)
|
2008-09-05 |
2014-07-15 |
Vixs Systems, Inc. |
Device with privileged memory and applications thereof
|
US9501429B2
(en)
|
2008-09-05 |
2016-11-22 |
Vixs Systems Inc. |
Dynamic key and rule storage protection
|
US8594333B2
(en)
|
2008-09-05 |
2013-11-26 |
Vixs Systems, Inc |
Secure key access with one-time programmable memory and applications thereof
|
EP2166761A1
(en)
|
2008-09-19 |
2010-03-24 |
Nagravision S.A. |
Method to enforce by a management center the access rules to a broadcast product
|
US9559842B2
(en)
|
2008-09-30 |
2017-01-31 |
Hewlett Packard Enterprise Development Lp |
Trusted key management for virtualized platforms
|
US8213620B1
(en)
|
2008-11-17 |
2012-07-03 |
Netapp, Inc. |
Method for managing cryptographic information
|
US20100146582A1
(en)
|
2008-12-04 |
2010-06-10 |
Dell Products L.P. |
Encryption management in an information handling system
|
US8225110B2
(en)
|
2009-01-09 |
2012-07-17 |
Telefonaktiebolaget Lm Ericsson (Publ) |
Cryptographic protection of usage restrictions in electronic devices
|
GB2472491B
(en)
|
2009-02-06 |
2013-09-18 |
Thales Holdings Uk Plc |
System and method for multilevel secure object management
|
US8325924B2
(en)
|
2009-02-19 |
2012-12-04 |
Microsoft Corporation |
Managing group keys
|
US20100218235A1
(en)
|
2009-02-25 |
2010-08-26 |
Ganot Asaf |
Method and system for temporarily removing group policy restrictions remotely
|
US8837718B2
(en)
|
2009-03-27 |
2014-09-16 |
Microsoft Corporation |
User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store
|
US20100246828A1
(en)
|
2009-03-30 |
2010-09-30 |
David Johnston |
Method and system of parallelized data decryption and key generation
|
US8959353B2
(en)
|
2009-03-31 |
2015-02-17 |
Topaz Systems, Inc. |
Distributed system for multi-function secure verifiable signer authentication
|
US20100266132A1
(en)
|
2009-04-15 |
2010-10-21 |
Microsoft Corporation |
Service-based key escrow and security for device data
|
US8964982B2
(en)
|
2009-04-24 |
2015-02-24 |
Nippon Telegraph And Telephone Corporation |
Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium
|
ES2365887B1
(es)
|
2009-05-05 |
2012-09-03 |
Scytl Secure Electronic Voting S.A. |
Metodo de verificacion de procesos de descifrado
|
US9626398B2
(en)
|
2012-05-22 |
2017-04-18 |
Hewlett Packard Enterprise Development Lp |
Tree data structure
|
GB2471282B
(en)
|
2009-06-22 |
2015-02-18 |
Barclays Bank Plc |
Method and system for provision of cryptographic services
|
US20110047610A1
(en)
|
2009-08-19 |
2011-02-24 |
Keypair Technologies, Inc. |
Modular Framework for Virtualization of Identity and Authentication Processing for Multi-Factor Authentication
|
US20110113235A1
(en)
|
2009-08-27 |
2011-05-12 |
Craig Erickson |
PC Security Lock Device Using Permanent ID and Hidden Keys
|
US8831228B1
(en)
|
2009-08-28 |
2014-09-09 |
Adobe Systems Incorporated |
System and method for decentralized management of keys and policies
|
US8630422B2
(en)
|
2009-11-10 |
2014-01-14 |
International Business Machines Corporation |
Fully homomorphic encryption method based on a bootstrappable encryption scheme, computer program and apparatus
|
US9012493B2
(en)
|
2009-11-12 |
2015-04-21 |
Nippon Soda Co., Ltd. |
1-heterodiene derivative and pest control agent
|
US8447734B2
(en)
|
2009-11-30 |
2013-05-21 |
Hewlett-Packard Development Company, L.P. |
HDAG backup system with variable retention
|
US9037711B2
(en)
*
|
2009-12-02 |
2015-05-19 |
Metasecure Corporation |
Policy directed security-centric model driven architecture to secure client and cloud hosted web service enabled processes
|
US9537650B2
(en)
|
2009-12-15 |
2017-01-03 |
Microsoft Technology Licensing, Llc |
Verifiable trust for data through wrapper composition
|
US9294270B2
(en)
|
2010-01-05 |
2016-03-22 |
Cisco Technology, Inc. |
Detection of stale encryption policy by group members
|
US8539220B2
(en)
|
2010-02-26 |
2013-09-17 |
Microsoft Corporation |
Secure computation using a server module
|
FR2958101A1
(fr)
|
2010-03-26 |
2011-09-30 |
Ntx Res |
Infrastructure de gestion de bi-cles de securite de personnes physiques (igcp/pki)
|
WO2011137927A1
(en)
|
2010-05-04 |
2011-11-10 |
C.K.D. Cryptography Key Databank Sagl |
Method to control and limit readability of electronic documents
|
US8675875B2
(en)
|
2010-05-18 |
2014-03-18 |
International Business Machines Corporation |
Optimizing use of hardware security modules
|
US8971535B2
(en)
|
2010-05-27 |
2015-03-03 |
Bladelogic, Inc. |
Multi-level key management
|
US20110296171A1
(en)
|
2010-05-28 |
2011-12-01 |
Christina Fu |
Key recovery mechanism
|
US8423764B2
(en)
|
2010-06-23 |
2013-04-16 |
Motorola Solutions, Inc. |
Method and apparatus for key revocation in an attribute-based encryption scheme
|
US8661499B2
(en)
|
2010-07-07 |
2014-02-25 |
Ca, Inc. |
Dynamic policy trees for matching policies
|
EP2787680B1
(en)
|
2010-07-23 |
2017-03-29 |
Nippon Telegraph And Telephone Corporation |
Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium
|
WO2012016091A2
(en)
*
|
2010-07-28 |
2012-02-02 |
Nextlabs, Inc. |
Protecting documents using policies and encryption
|
GB2483167B
(en)
|
2010-08-27 |
2013-05-29 |
Fxi Technologies As |
Storage device with separate application and interface processors
|
US10122693B2
(en)
|
2010-10-25 |
2018-11-06 |
International Business Machines Corporation |
Protocol based key management
|
US9053339B2
(en)
|
2010-10-27 |
2015-06-09 |
Hytrust, Inc. |
System and method for secure storage of virtual machines
|
JP4892093B1
(ja)
|
2010-11-09 |
2012-03-07 |
株式会社東芝 |
認証連携システム及びidプロバイダ装置
|
US9589145B2
(en)
|
2010-11-24 |
2017-03-07 |
Oracle International Corporation |
Attaching web service policies to a group of policy subjects
|
US8719253B2
(en)
|
2010-12-01 |
2014-05-06 |
Cisco Technology, Inc. |
Method and apparatus for efficiently organizing hierarchical QoS policies
|
US8635464B2
(en)
|
2010-12-03 |
2014-01-21 |
Yacov Yacobi |
Attribute-based access-controlled data-storage system
|
US8996863B2
(en)
|
2010-12-03 |
2015-03-31 |
Yacov Yacobi |
Attribute-based access-controlled data-storage system
|
US8793286B2
(en)
|
2010-12-09 |
2014-07-29 |
International Business Machines Corporation |
Hierarchical multi-tenancy management of system resources in resource groups
|
US10817421B2
(en)
|
2010-12-13 |
2020-10-27 |
Sandisk Technologies Llc |
Persistent data structures
|
US8479008B2
(en)
|
2010-12-15 |
2013-07-02 |
Microsoft Corporation |
Providing security services on the cloud
|
US8352749B2
(en)
|
2010-12-17 |
2013-01-08 |
Google Inc. |
Local trusted services manager for a contactless smart card
|
US9058497B2
(en)
|
2010-12-23 |
2015-06-16 |
Microsoft Technology Licensing, Llc |
Cryptographic key management
|
US9256745B2
(en)
|
2011-03-01 |
2016-02-09 |
Microsoft Technology Licensing, Llc |
Protecting operating system configuration values using a policy identifying operating system configuration settings
|
WO2012149395A1
(en)
|
2011-04-29 |
2012-11-01 |
International Business Machines Corporation |
Fully homomorphic encryption
|
US9690941B2
(en)
|
2011-05-17 |
2017-06-27 |
Microsoft Technology Licensing, Llc |
Policy bound key creation and re-wrap service
|
US8621483B2
(en)
|
2011-06-20 |
2013-12-31 |
Nokia Corporation |
Methods, apparatuses and computer program products for provisioning applications to in vehicle infotainment systems with secured access
|
US8707026B2
(en)
|
2011-07-13 |
2014-04-22 |
International Business Machines Corporation |
Apparatus for certificate-based cookie security
|
US8798273B2
(en)
|
2011-08-19 |
2014-08-05 |
International Business Machines Corporation |
Extending credential type to group Key Management Interoperability Protocol (KMIP) clients
|
US20130044882A1
(en)
|
2011-08-19 |
2013-02-21 |
International Business Machines Corporation |
Enhancing provisioning for keygroups using key management interoperability protocol (KMIP)
|
EP2756627B1
(en)
|
2011-09-28 |
2018-11-14 |
Koninklijke Philips N.V. |
Hierarchical attribute-based encryption and decryption
|
US9647993B2
(en)
|
2011-10-13 |
2017-05-09 |
Evolium Technologies, S.L. |
Multi-repository key storage and selection
|
US20130097123A1
(en)
|
2011-10-18 |
2013-04-18 |
Research In Motion Limited |
Method and System for Determining Eligible Communication Partners Utilizing an Entity Discovery Engine
|
US9043866B2
(en)
|
2011-11-14 |
2015-05-26 |
Wave Systems Corp. |
Security systems and methods for encoding and decoding digital content
|
US9489528B2
(en)
|
2011-12-12 |
2016-11-08 |
Microsoft Technology Licensing, Llc |
Single use recovery key
|
US10133662B2
(en)
|
2012-06-29 |
2018-11-20 |
Sandisk Technologies Llc |
Systems, methods, and interfaces for managing persistent data of atomic storage operations
|
CN103297958B
(zh)
|
2012-02-22 |
2017-04-12 |
华为技术有限公司 |
建立安全上下文的方法、装置及系统
|
US9166777B2
(en)
|
2012-03-05 |
2015-10-20 |
Echoworx Corporation |
Method and system for user authentication for computing devices utilizing PKI and other user credentials
|
EP2823595B1
(en)
|
2012-03-06 |
2017-08-23 |
Nokia Technologies Oy |
Method, apparatuses, and computer-readable storage medium for securely accessing social networking data
|
CN103368901A
(zh)
|
2012-03-27 |
2013-10-23 |
复旦大学 |
基于大规模离散数据的云计算系统
|
US8892865B1
(en)
|
2012-03-27 |
2014-11-18 |
Amazon Technologies, Inc. |
Multiple authority key derivation
|
US8843739B2
(en)
|
2012-04-04 |
2014-09-23 |
Lockheed Martin Corporation |
Anti-tamper device, system, method, and computer-readable medium
|
US9130837B2
(en)
|
2012-05-22 |
2015-09-08 |
Cisco Technology, Inc. |
System and method for enabling unconfigured devices to join an autonomic network in a secure manner
|
WO2014002094A2
(en)
|
2012-06-25 |
2014-01-03 |
Storone Ltd. |
System and method for datacenters disaster recovery
|
US20140019753A1
(en)
|
2012-07-10 |
2014-01-16 |
John Houston Lowry |
Cloud key management
|
US10169571B1
(en)
|
2012-07-18 |
2019-01-01 |
Sequitur Labs, Inc. |
System and method for secure, policy-based access control for mobile computing devices
|
US9294508B2
(en)
|
2012-08-02 |
2016-03-22 |
Cellsec Inc. |
Automated multi-level federation and enforcement of information management policies in a device network
|
US9286477B2
(en)
|
2012-08-29 |
2016-03-15 |
Symantec Corporation |
Secure app ecosystem with key and data exchange according to enterprise information control policy
|
US9256763B2
(en)
|
2012-09-03 |
2016-02-09 |
Nec Europe Ltd. |
Method and system for providing a public key/secret key pair for encrypting and decrypting data
|
AU2013312578A1
(en)
|
2012-09-10 |
2015-04-02 |
Nwstor Limited |
Data security management system
|
US9769124B2
(en)
|
2012-09-21 |
2017-09-19 |
Nokia Technologies Oy |
Method and apparatus for providing access control to shared data based on trust level
|
US10210175B2
(en)
|
2012-09-28 |
2019-02-19 |
Oracle International Corporation |
Techniques for lifecycle state management and in-database archiving
|
US9418209B2
(en)
|
2012-10-02 |
2016-08-16 |
Google Technology Holdings LLC |
Systems and methods for manipulating sensitive information in a secure mobile environment
|
US8613070B1
(en)
|
2012-10-12 |
2013-12-17 |
Citrix Systems, Inc. |
Single sign-on access in an orchestration framework for connected devices
|
US9342666B2
(en)
|
2012-10-31 |
2016-05-17 |
Intel Corporation |
Providing security support for digital rights management in different formats
|
CN107547571B
(zh)
|
2012-11-21 |
2021-06-22 |
苹果公司 |
用于管理访问控制的方法和访问控制客户端供应服务器
|
US8990883B2
(en)
|
2013-01-02 |
2015-03-24 |
International Business Machines Corporation |
Policy-based development and runtime control of mobile applications
|
US8559631B1
(en)
|
2013-02-09 |
2013-10-15 |
Zeutro Llc |
Systems and methods for efficient decryption of attribute-based encryption
|
US10210341B2
(en)
|
2013-02-12 |
2019-02-19 |
Amazon Technologies, Inc. |
Delayed data access
|
US9547771B2
(en)
|
2013-02-12 |
2017-01-17 |
Amazon Technologies, Inc. |
Policy enforcement with associated data
|
US9853979B1
(en)
|
2013-03-11 |
2017-12-26 |
Amazon Technologies, Inc. |
Immediate policy effectiveness in eventually consistent systems
|
US9712508B2
(en)
|
2013-03-13 |
2017-07-18 |
Intel Corporation |
One-touch device personalization
|
US9578061B2
(en)
|
2013-03-13 |
2017-02-21 |
FireMon, LLC |
System and method for modeling a networking device policy
|
US9401915B2
(en)
|
2013-03-15 |
2016-07-26 |
Airwatch Llc |
Secondary device as key for authorizing access to resources
|
US9378065B2
(en)
*
|
2013-03-15 |
2016-06-28 |
Advanced Elemental Technologies, Inc. |
Purposeful computing
|
US9716728B1
(en)
|
2013-05-07 |
2017-07-25 |
Vormetric, Inc. |
Instant data security in untrusted environments
|
US20140344570A1
(en)
|
2013-05-20 |
2014-11-20 |
Microsoft Corporation |
Data Protection For Organizations On Computing Devices
|
US10681023B2
(en)
|
2013-06-28 |
2020-06-09 |
Ssh Communications Security Oyj |
Self-service portal for provisioning passwordless access
|
FR3009163B1
(fr)
|
2013-07-25 |
2015-09-04 |
Thales Sa |
Procede pour l'echange en securite d'une donnee sur un reseau ad-hoc mettant en oeuvre un service de diffusion xcast; noeud associe
|
WO2015016828A1
(en)
|
2013-07-30 |
2015-02-05 |
Hewlett-Packard Development Company, L.P. |
Data management
|
US9465947B2
(en)
|
2013-08-05 |
2016-10-11 |
Samsung Sds America, Inc. |
System and method for encryption and key management in cloud storage
|
US9124430B2
(en)
|
2013-09-23 |
2015-09-01 |
Venafi, Inc. |
Centralized policy management for security keys
|
US9083752B2
(en)
|
2013-10-01 |
2015-07-14 |
Codeproof Technologies, Inc. |
Mobile device management as a simplified online software service
|
KR101754308B1
(ko)
|
2013-10-04 |
2017-07-07 |
한국전자통신연구원 |
모바일 민감 데이터 관리 방법 및 이를 수행하는 위탁 서버
|
AU2014332244A1
(en)
|
2013-10-07 |
2016-05-05 |
Fornetix Llc |
System and method for encryption key management, federation and distribution
|
US9087205B2
(en)
|
2013-10-11 |
2015-07-21 |
Sap Se |
Shared encrypted storage
|
US9774448B2
(en)
|
2013-10-30 |
2017-09-26 |
Duo Security, Inc. |
System and methods for opportunistic cryptographic key management on an electronic device
|
US9213764B2
(en)
|
2013-11-22 |
2015-12-15 |
Sap Se |
Encrypted in-memory column-store
|
US9756048B2
(en)
|
2013-11-24 |
2017-09-05 |
Truly Protect Oy |
System and methods for executing encrypted managed programs
|
US9280678B2
(en)
|
2013-12-02 |
2016-03-08 |
Fortinet, Inc. |
Secure cloud storage distribution and aggregation
|
US9639589B1
(en)
|
2013-12-20 |
2017-05-02 |
Amazon Technologies, Inc. |
Chained replication techniques for large-scale data streams
|
JP6203093B2
(ja)
|
2014-03-19 |
2017-09-27 |
株式会社東芝 |
通信システム、通信装置、通信方法およびプログラム
|
US9577823B2
(en)
|
2014-03-21 |
2017-02-21 |
Venafi, Inc. |
Rule-based validity of cryptographic key material
|
US9686244B2
(en)
|
2014-03-21 |
2017-06-20 |
Venafi, Inc. |
Rule-based validity of cryptographic key material
|
US9531533B2
(en)
|
2014-03-21 |
2016-12-27 |
Venafi, Inc. |
Rule-based validity of cryptographic key material
|
US9654922B2
(en)
|
2014-03-21 |
2017-05-16 |
Venafi, Inc. |
Geo-fencing cryptographic key material
|
US9626399B2
(en)
|
2014-03-31 |
2017-04-18 |
Sandisk Technologies Llc |
Conditional updates for reducing frequency of data modification operations
|
US9626400B2
(en)
|
2014-03-31 |
2017-04-18 |
Sandisk Technologies Llc |
Compaction of information in tiered data structure
|
US9537854B2
(en)
|
2014-04-18 |
2017-01-03 |
Symantec Corporation |
Transmitting encoded digital certificate data to certificate authority using mobile device
|
US9565227B1
(en)
|
2014-06-16 |
2017-02-07 |
Teradici Corporation |
Composition control method for remote application delivery
|
US9514324B1
(en)
|
2014-06-20 |
2016-12-06 |
Amazon Technologies, Inc. |
Approaches for restricting access to data
|
US9774577B2
(en)
|
2014-06-24 |
2017-09-26 |
Tata Consultancy Services Limited |
Device, system and method providing data security and attribute based data access in participatory sensing
|
US9258117B1
(en)
|
2014-06-26 |
2016-02-09 |
Amazon Technologies, Inc. |
Mutual authentication with symmetric secrets and signatures
|
US10747888B2
(en)
|
2014-06-30 |
2020-08-18 |
Nicira, Inc. |
Method and apparatus for differently encrypting data messages for different logical networks
|
US10067722B2
(en)
|
2014-07-02 |
2018-09-04 |
Hedvig, Inc |
Storage system for provisioning and storing data to a virtual disk
|
US9571463B2
(en)
|
2014-07-14 |
2017-02-14 |
Raytheon Bbn Technologies Corp. |
Policy-based access control in content networks
|
US20160036826A1
(en)
|
2014-07-29 |
2016-02-04 |
Mcafee, Inc. |
Secure content packaging using multiple trusted execution environments
|
US20160048408A1
(en)
|
2014-08-13 |
2016-02-18 |
OneCloud Labs, Inc. |
Replication of virtualized infrastructure within distributed computing environments
|
US10462114B2
(en)
|
2014-09-07 |
2019-10-29 |
Definitive Data Security, Inc. |
System and associated software for providing advanced data protections in a defense-in-depth system by integrating multi-factor authentication with cryptographic offloading
|
US9716716B2
(en)
|
2014-09-17 |
2017-07-25 |
Microsoft Technology Licensing, Llc |
Establishing trust between two devices
|
US10592093B2
(en)
|
2014-10-09 |
2020-03-17 |
Splunk Inc. |
Anomaly detection
|
US10038674B2
(en)
|
2014-10-17 |
2018-07-31 |
Sap Se |
Secure mobile data sharing
|
US9407612B2
(en)
|
2014-10-31 |
2016-08-02 |
Intel Corporation |
Technologies for secure inter-virtual network function communication
|
US9495545B2
(en)
|
2014-11-13 |
2016-11-15 |
Sap Se |
Automatically generate attributes and access policies for securely processing outsourced audit data using attribute-based encryption
|
EP3171282A4
(en)
|
2014-11-19 |
2017-12-06 |
Informex Inc. |
Data retrieval apparatus, program and recording medium
|
US20170364911A1
(en)
*
|
2014-12-12 |
2017-12-21 |
Cryptomathic Ltd |
Systems and method for enabling secure transaction
|
US10560441B2
(en)
|
2014-12-17 |
2020-02-11 |
Amazon Technologies, Inc. |
Data security operations with expectations
|
WO2016119900A1
(en)
|
2015-01-30 |
2016-08-04 |
Nec Europe Ltd. |
Method and system for managing encrypted data of devices
|
US9552493B2
(en)
|
2015-02-03 |
2017-01-24 |
Palo Alto Research Center Incorporated |
Access control framework for information centric networking
|
JP6405255B2
(ja)
|
2015-02-05 |
2018-10-17 |
株式会社日立製作所 |
通信システム、キュー管理サーバ、及び、通信方法
|
US10594484B2
(en)
|
2015-02-13 |
2020-03-17 |
Yoti Holding Limited |
Digital identity system
|
EP3059690B1
(en)
|
2015-02-19 |
2019-03-27 |
Axiomatics AB |
Remote rule execution
|
US9626245B2
(en)
|
2015-02-20 |
2017-04-18 |
Netapp, Inc. |
Policy based hierarchical data protection
|
US10560440B2
(en)
|
2015-03-12 |
2020-02-11 |
Fornetix Llc |
Server-client PKI for applied key management system and process
|
US10630686B2
(en)
|
2015-03-12 |
2020-04-21 |
Fornetix Llc |
Systems and methods for organizing devices in a policy hierarchy
|
US9967289B2
(en)
|
2015-03-12 |
2018-05-08 |
Fornetix Llc |
Client services for applied key management systems and processes
|
US10965459B2
(en)
|
2015-03-13 |
2021-03-30 |
Fornetix Llc |
Server-client key escrow for applied key management system and process
|
US10114966B2
(en)
|
2015-03-19 |
2018-10-30 |
Netskope, Inc. |
Systems and methods of per-document encryption of enterprise information stored on a cloud computing service (CCS)
|
US9680649B2
(en)
|
2015-03-19 |
2017-06-13 |
Oracle International Corporation |
Policy-based key sharing
|
US9660969B2
(en)
|
2015-03-31 |
2017-05-23 |
Here Global B.V. |
Method and apparatus for providing key management for data encryption for cloud-based big data environments
|
US10339106B2
(en)
|
2015-04-09 |
2019-07-02 |
Commvault Systems, Inc. |
Highly reusable deduplication database after disaster recovery
|
US9871816B2
(en)
|
2015-04-26 |
2018-01-16 |
Y.G. Noobaa Ltd. |
Systems and methods for security management of multi-client based distributed storage
|
GB201508872D0
(en)
|
2015-05-22 |
2015-07-01 |
Exate Technology Ltd |
Encryption and decryption system
|
US9390285B1
(en)
|
2015-06-09 |
2016-07-12 |
Hortonworks, Inc. |
Identifying inconsistent security policies in a computer cluster
|
US10419438B2
(en)
|
2015-06-09 |
2019-09-17 |
Intel Corporation |
System, apparatus and method for auto-optimization of access control policy and key management in a network authoring tool
|
US9591000B2
(en)
|
2015-06-19 |
2017-03-07 |
Oracle International Corporation |
Methods, systems, and computer readable media for authorization frameworks for web-based applications
|
US10257175B2
(en)
|
2015-09-28 |
2019-04-09 |
Fornetix Llc |
Encryption deployment discovery
|
US9830470B2
(en)
|
2015-10-09 |
2017-11-28 |
Sap Se |
Encrypting data for analytical web applications
|
US10169600B2
(en)
|
2015-10-13 |
2019-01-01 |
International Business Machines Corporation |
Encryption policies for various nodes of a file
|
US11222074B2
(en)
|
2015-11-25 |
2022-01-11 |
Teamifier, Inc. |
Methods for the augmentation, exploration, and maintenance of project hierarchies
|
CN106936570B
(zh)
|
2015-12-31 |
2021-08-20 |
华为技术有限公司 |
一种密钥配置方法及密钥管理中心、网元
|
US10462137B2
(en)
*
|
2016-01-29 |
2019-10-29 |
Cisco Technology, Inc. |
Secure confirmation exchange for offline industrial machine
|
US11063980B2
(en)
|
2016-02-26 |
2021-07-13 |
Fornetix Llc |
System and method for associating encryption key management policy with device activity
|
US10348485B2
(en)
|
2016-02-26 |
2019-07-09 |
Fornetix Llc |
Linking encryption key management with granular policy
|
US10917239B2
(en)
|
2016-02-26 |
2021-02-09 |
Fornetix Llc |
Policy-enabled encryption keys having ephemeral policies
|
US10880281B2
(en)
|
2016-02-26 |
2020-12-29 |
Fornetix Llc |
Structure of policies for evaluating key attributes of encryption keys
|
US10931653B2
(en)
|
2016-02-26 |
2021-02-23 |
Fornetix Llc |
System and method for hierarchy manipulation in an encryption key management system
|
US10860086B2
(en)
|
2016-02-26 |
2020-12-08 |
Fornetix Llc |
Policy-enabled encryption keys having complex logical operations
|
US10489424B2
(en)
|
2016-09-26 |
2019-11-26 |
Amazon Technologies, Inc. |
Different hierarchies of resource data objects for managing system resources
|
US10523645B2
(en)
|
2016-10-21 |
2019-12-31 |
Thales Esecurity, Inc. |
Method and system for protecting user data using individualized keys to enable secure compartmentalized data backup/restore
|
US10078552B2
(en)
|
2016-12-29 |
2018-09-18 |
Western Digital Technologies, Inc. |
Hierarchic storage policy for distributed object storage systems
|
JP7393209B2
(ja)
|
2017-01-26 |
2023-12-06 |
センパー フォーティス ソリューションズ リミテッド ライアビリティ カンパニー |
マルチテナントクラウドにおける複数のシングルレベルセキュリティ(msls)
|
US10547598B2
(en)
|
2017-02-13 |
2020-01-28 |
Thales Esecurity, Inc. |
Abstracted cryptographic material management across multiple service providers
|
US10721079B2
(en)
|
2017-04-05 |
2020-07-21 |
Venafi, Inc. |
Detection of anomalous key material
|
FR3076423B1
(fr)
|
2017-12-28 |
2020-01-31 |
Thales |
Procede et systeme d'activation cryptographique d'une pluralite d'equipements
|